In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Regulations, Standards, Negotiating and SLAs, PCI and the Cloud, Evaluating Providers, Incident Response
Private and Hybrid Clouds, IaaS, PaaS, SaaS, Public Clouds
Legacy Applications, Security Services, Networking, IAM, Data Protection, Patching
Malicious actors have found new ways to attack non-jailbroken iOS devices, but experts say the YiSpecter iOS malware may not be as dangerous as it sounds.
Expert Bill Hayes examines the strengths and weaknesses of top-rated data loss prevention (DLP) products to help enterprises make the right purchasing decision.
Researchers warned about the rise of a new cross-site scripting flaw involving same-origin policy. Expert Nick Lewis explains the vulnerability and how to prevent falling victim.
Vertical-specific cloud services are going further down the stack as companies such as GE try to get in the door with the Industrial Internet.
Through the Massachusetts Open Cloud initiative, Boston University professor Orran Krieger is adamant on reshaping the public cloud market and spurring big data innovation.
VMware recently previewed NSX integration with AWS, in a move that could have big implications for vCloud Air users deploying hybrid cloud.
AWS shops are eager for relief setting up Elasticsearch clusters, even if integration with one important tool still requires some manual intervention.
Companies that send and receive bulk email look forward to taking advantage of a major new Amazon SES capability.
Enterprises can struggle managing different cloud interfaces but can more easily coordinate resources by using Chef with AWS.
Are you just getting started with Azure application development? Here are five resources to ease your way.
Mobile and cloud applications may be the future, but the Windows platform is not yet in the past.
Service-level agreements for cloud computing will fail unless you approach the process like a small project. Expert Tom Nolle offers three steps for creating an effective cloud SLA.
Docker's name has become synonymous with containers, but there are other container management tools available.
Containers have rapidly come into focus as an option for deploying applications, but they have limitations and are fundamentally different from VMs.
Virtualizing database servers is no longer taboo, but you can still experience performance problems if it's not correctly configured.
Delegates will give their unbiased opinions about a product, which could be a huge boost for a vendor or a bad sign.
Something as small as a flash drive can be a danger to your virtual machines and the data inside them. Make sure to keep your info secure.
A new version of vSphere wasn't announced at VMworld, but the new technologies that were left users excited for the future
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens
Around 600 Evry staff in the Nordics are to move to IBM in $1bn IT outsourcing deal that sees the firm hand over its IT infrastructure for the next 10 years
Common IT systems that talk to each other and better communication between general practitioners and hospitals are key to reducing unnecessary appointments, a report has found